Sciweavers

2951 search results - page 456 / 591
» Secure Distributed DNS
Sort
View
COMCOM
2006
62views more  COMCOM 2006»
15 years 4 months ago
Self-monitoring of wireless sensor networks
This paper presents an efficient distributed self-monitoring mechanism for a class of wireless sensor networks used for monitoring and surveillance. In these applications, it is i...
Chih-fan Hsin, Mingyan Liu
IJOE
2008
107views more  IJOE 2008»
15 years 4 months ago
SOA Meets Robots - A Service-Based Software Infrastructure for Remote Laboratories
With the ongoing internationalization of virtual laboratories, the integration of such infrastructures becomes more important. The meanwhile commonly accepted 'glue' for...
Peter Tröger, Andreas Rasche, Frank Feinbube,...
IJNSEC
2006
98views more  IJNSEC 2006»
15 years 4 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao
JCM
2008
74views more  JCM 2008»
15 years 4 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker